Information content security on the Internet:the control model and its evaluation

被引:4
|
作者
FANG BinXing1
2Institute of Computing Technology
3Graduate University of Chinese Academy of Sciences
4National Computer Network Emergency Response Technical Team/Coordination Center of China
机构
关键词
content security; access control; quantitative evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., assuring the information content security (ICS), has become a reasonable yet challenging alternative. At present, there is an urgent need to develop a systematic model that can effectively carry out the curbing. In fact, curbing the transmission of harmful information by way of filtering can be modeled by access control. In the paper, based on the three core-elements of communication, namely, "Who communicates with whom", "How do they communicate" and "What is the content of communication", we propose a control model, called ICCON. Unlike the existing access control, the reference monitor (RM) of our model is placed in the transmission channel, and moreover, an evaluation frame is proposed, through which the effectiveness of the RM in controlling information transmission on the Internet can be quantitatively evaluated.
引用
收藏
页码:30 / 49
页数:20
相关论文
共 50 条
  • [1] Information content security on the Internet: the control model and its evaluation
    BinXing Fang
    YunChuan Guo
    Yuan Zhou
    Science in China Series F: Information Sciences, 2010, 53 : 30 - 49
  • [2] Information content security on the Internet: the control model and its evaluation
    Fang BinXing
    Guo YunChuan
    Zhou Yuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (01) : 30 - 49
  • [3] Internet Content Security Technology and Its Evaluation Criteria
    Li, Zichen
    Wang, Wenjing
    2010 INTERNATIONAL CONFERENCE ON FUTURE CONTROL AND AUTOMATION (ICFCA 2010), 2010, : 92 - 94
  • [4] Research on Controllability of Internet Information Content Security
    Yin, Lihua
    Fang, Binxing
    Guo, Yunchuan
    He, Hui
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 386 - +
  • [5] A flexible security model for using Internet content
    Anand, R
    Islam, N
    Jaeger, T
    Rao, JR
    SIXTEENTH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1997, : 89 - 96
  • [6] Information Security Ontology Model For Internet of Thing
    Ren, Weiwu
    Hu, Liang
    Zhao, Kuo
    Jia, Bing
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2466 - +
  • [7] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [8] Information security and the Internet
    Doddrell, GR
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1996, 6 (01): : 5 - &
  • [9] Design of security evaluation system for mobile Internet Information management platform based on BOPPPS model
    Bao Hongrui
    He Haiguang
    Yang Qinsi
    Jin Feng
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 216 - 220
  • [10] Information Security Transmission Technology in Internet of Things Control System
    Zou, Ying
    Lv, Jiezhuo
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 177 - 190